29
Social Engineering Wali Memon Wali Memon 1

Social Engineering

Embed Size (px)

Citation preview

Page 1: Social Engineering

Social Engineering

Wali Memon

Wali Memon1

Page 2: Social Engineering

“You could spend a fortune purchasing

technology and services...and your network infrastructure could still remain vulnerable to old-fashioned manipulation.”

-Kevin Mitnick

Wali Memon2

Page 3: Social Engineering

What is Social Engineering?

� Uses Psychological Methods

� Exploits human tendency to trust

� Goals are the Same as Hacking

Wali Memon3

Page 4: Social Engineering

Why Social Engineering?

� Easier than technical hacking

� Hard to detect and track

Wali Memon4

Page 5: Social Engineering

The Mind of a Social Engineer

� More like actors than hackers

� Learn to know how people feel by observing their actions

� can alter these feelings by changing what they say and do

� make the victim want to give them the information they need

Wali Memon5

Page 6: Social Engineering

Approaches

� Carelessness

� Comfort Zone

� Helpfulness

� Fear

Wali Memon6

Page 7: Social Engineering

Careless Approach

� Victim is Careless

� Does not implement, use, or enforce proper countermeasures

� Used for Reconnaissance

� Looking for what is laying around

Wali Memon7

Page 8: Social Engineering

Careless Examples

�Dumpster Diving/Trashing

�Huge amount of information in the trash

�Most of it does not seem to be a threat

�The who, what and where of an organization

�Knowledge of internal systems

�Materials for greater authenticity

�Intelligence Agencies have done this for years

Wali Memon8

Page 9: Social Engineering

Careless Examples (cont.)

� Building/Password Theft

� Requires physical access

� Looking for passwords or other information left out in the open

� Little more information than dumpster diving

Wali Memon9

Page 10: Social Engineering

Careless Examples (cont.)

� Password Harvesting

� Internet or mail-in sweepstakes

� Based on the belief that people don’t change their passwords over

different accounts

Wali Memon10

Page 11: Social Engineering

Comfort Zone Approach

� Victim organization members are in a comfortable environment

� Lower threat perception

� Usually requires the use of another approach

Wali Memon11

Page 12: Social Engineering

Comfort Zone Examples

� Impersonation

�Could be anyone

�Tech Support

�Co-Worker

�Boss

�CEO

�User

�Maintenance Staff

�Generally Two Goals

�Asking for a password

�Building access - Careless Approach

Wali Memon12

Page 13: Social Engineering

Comfort Examples (cont.)

� Shoulder Surfing

� Direct Theft

� Outside workplace

� Wallet, id badge, or purse stolen

� Smoking Zone

� Attacker will sit out in the smoking area

� Piggy back into the office when users go back to work

Wali Memon13

Page 14: Social Engineering

Comfort Examples (cont)

� Insider Threats

� Legitimate employee

� Could sell or use data found by “accident”

� Result of poor access control

� Asking for favors from IT staff for information

� Usually spread out over a long period of time

Wali Memon14

Page 15: Social Engineering

Helpful Approach

� People generally try to help even if they do not know who they are

helping

� Usually involves being in a position of obvious need

� Attacker generally does not even ask for the help they receive

Wali Memon15

Page 16: Social Engineering

Helpful Examples

� Piggybacking

� Attacker will trail an employee entering the building

� More Effective:

� Carry something large so they hold the door open for you

� Go in when a large group of employees are going in

� Pretend to be unable to find door key

Wali Memon16

Page 17: Social Engineering

Helpful Examples (cont.)

� Troubled user

� Calling organization numbers asking for help

� Getting a username and asking to have a password reset

Wali Memon17

Page 18: Social Engineering

Fear Approach

� Usually draws from the other approaches

� Puts the user in a state of fear and anxiety

� Very aggressive

Wali Memon18

Page 19: Social Engineering

Fear Examples

� Conformity

� The user is the only one who has not helped out the attacker with this

request in the past

� Personal responsibility is diffused

� User gets justification for granting an attack.

Wali Memon19

Page 20: Social Engineering

Fear Examples (cont)

� Time Frame

� Fictitious deadline

� Impersonates payroll bookkeeper, proposal coordinator

� Asks for password change

Wali Memon20

Page 21: Social Engineering

Fear Examples (cont)

� Importance

� Classic boss or director needs routine password reset

� Showing up from a utility after a natural occurrence (thunderstorm,

tornado, etc)

Wali Memon21

Page 22: Social Engineering

Advanced Attacks

� Offering a Service

� Attacker contacts the user

� Uses viruses, worms, or trojans

� User could be approached at home or at work

� Once infected, attacker collects needed information

Wali Memon22

Page 23: Social Engineering

Advanced Attacks (cont)

� Reverse Social Engineering

� Attacks puts themselves in a position of authority

� Users ask attacker for help and information

� Attacker takes information and asks for what they need while fixing the

problem for the user

Wali Memon23

Page 24: Social Engineering

Combating Social Engineers

� User Education and Training

� Identifying Areas of Risk

� Tactics correspond to Area

� Strong, Enforced, and Tested Security Policy

Wali Memon24

Page 25: Social Engineering

User Education and Training

�Security Orientation for new employees

�Yearly security training for all employees

�Weekly newsletters, videos, brochures, games and booklets detailing incidents and how they could have been prevented

�Signs, posters, coffee mugs, pens, pencils, mouse pads, screen savers, etc with security slogans (I.e. “Loose lips sink ships”).

Wali Memon25

Page 26: Social Engineering

Areas of Risk

� Certain areas have certain risks

� What are the risks for these areas?

� Help Desk, Building entrance, Office, Mail Room, Machine room/Phone

Closet, Dumpsters, Intranet/Internet, Overall

Wali Memon26

Page 27: Social Engineering

Security Policy

� Management should know the importance of protecting against

social engineering attacks

� Specific enough that employees should not have to make judgment

calls

� Include procedure for responding to an attack

Wali Memon27

Page 28: Social Engineering

Conclusions

� Social Engineering is a very real threat

� Realistic prevention is hard

� Can be expensive

� Militant Vs. Helpful Helpdesk Staff

� Reasonable Balance

Wali Memon28

Page 29: Social Engineering

References

� Psychological Based Social Engineering, Charles Lively.

December 2003. SANS Institute. 10 September 2005.

http://www.giac.org/certified_professionals/practicals/gsec

/3547.php

� Sarah Granger, “Social Engineering Fundamentals: Part I”.

Security Focus. December 2001. 10 September 2005.

http://www.securityfocus.com/infocus/1527

� Sarah Granger, “Social Engineering Fundamentals: Part II”.

Security Focus. January 2002. 10 September 2005.

http://www.securityfocus.com/infocus/1533

Wali Memon29